In answer to the last question, GUPI interfaces.  "Do the right thing in the 
right way."

In these sophisticated cases GUPI may also require APF authorization, which is 
OK if that is what the process requires to make it "done right".  If you don't 
have it you probably shouldn't be trying to use these techniques.

Peter

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: Monday, November 12, 2018 3:19 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Why are sophisticated system-level coding examples not available? 
[was: RE: Recommended method for accessing secondary access spaces]

On Mon, 12 Nov 2018 10:52:02 -0800, Charles Mills  wrote:
>+1
>I would say that sometimes right after a feature comes out there is a 
>presentation at SHARE, e.g., "How to use the new PC-ss facility." That is not 
>optimal if your first need to use PC-ss comes five or ten years after it first 
>is available. Some SHARE presentations are available online; some are not. 
>Some stand alone pretty well without the speaker's words; some do not.
>
>ISVs have their plates full just like IBM. We have even less incentive than 
>IBM to volunteer manpower to create HOWTO documentation, so I don't see it 
>happening that way.
>
FAQ?  Wiki?  (I know of neither.  Perhaps Planet MVS?)

>What business justification for IBM? Little now. But good documentation 
>examples should have been part of the budget when the facility was originally 
>implemented.

>-----Original Message-----
>From: Farley, Peter x23353
>Sent: Monday, November 12, 2018 10:14 AM
>
>Not jumping on Ed Jaffe or Peter Relson or any of the other thoughtful and 
>helpful responders in this email chain, but it still rankles me that there are 
>no good examples anywhere (not at IBM and not at CBT) for programmers to 
>review that show exactly how to set up and use "SRB to the other address space 
>and PC-ss back to the requesting address space" or any similarly sophisticated 
>system-level application coding technique.
>
>Why is system-level application coding made an obscure mystery to which only 
>IBM and (some) ISV's have access?  Good examples that show how to "do the 
>right thing" would avoid an awful lot of dangerous experimentation.  "Security 
>through obscurity" is, I think all here would agree. NOT a good thing.
> 
Are you thinking of GUPI or non-GUPI interfaces?  Peter R. largely,
prudently avoids discussing the latter.

--


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to